Abstract
With the major advancements in the field of technology and electronics, one persistent obstacle has proven to be one of the major challenges, namely : Data Security. To get connected securely and quickly through the electronic data transfer through the web, the data should be encrypted. Encryption is the process of transforming plain text into ciphered-text, which cannot be understood or altered easily by undesirable people. It can also be defined as the science that uses mathematics in data encryption and decryption operations. In this paper, we discuss several important algorithms used for the encryption and decryption of data in all fields, to make a comparative study for most important algorithms in terms of data security effectiveness, key size, complexity and time, etc. This research focused on different types of cryptography algorithms that are existing, like AES, DES, TDES, DSA, RSA, ECC, EEE and CR4…etc.
Key takeaways
AI
AI
- The paper analyzes various cryptographic algorithms focusing on effectiveness, key size, complexity, and processing time.
- Blowfish consistently outperforms AES, DES, and 3DES in terms of security and efficiency.
- AES requires 10, 12, or 14 rounds based on key sizes of 128, 192, or 256 bits respectively.
- 3DES enhances DES security by using three 56-bit keys in succession, totaling 168 bits.
- ECC achieves strong security with significantly smaller key sizes compared to traditional asymmetric algorithms.
References (35)
- ISSN 2250-3153 http://dx.doi.org/10.29322/IJSRP.8.7.2018.p79XX
- -RIMAN, C., and Abi-Char, P. E.: Comparative Analysis of Block Cipher-Based Encryption Algorithms: A Survey. Information Security and Computer Fraud, Vol.3, No.1, 1-7, (2015).
- -Elminaam, D. S. A., Kader, H. M. A., & Hadhoud, M. M.: Performance Evaluation of Symmetric Encryption Algorithms. International Journal of Computer Science and Network Security, Vol.8, No.12, 280-286, (2008).
- -Omar G. A., Elsadd, M. A., & Guirguis, S. K.: Investigation of Cryptography Algorithms used for Security and Privacy Protection in Smart Grid. In Power Systems Conference (MEPCON), 2017 Nineteenth International Middle East, IEEE, 644-649, (December 2017).
- -Sridevi, C.: A Survey on Network Security. Global Journal of Computer Science and Technology (2018). ISSN 2250-3153 http://dx.doi.org/10.29322/IJSRP.8.7.2018.p79XX
- -Singh, G.: A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security. International Journal of Computer Applications, Vol. 67, No. 19, (2013).
- -Singh, M. G., Singla, M. A., & Sandha, M. K.: Cryptography Algorithm Comparison for Security Enhancement in Wireless Intrusion Detection System. International Journal of Multidisciplinary Research, Vol. 1, No. 4, 143-151, (2011).
- -William, S.: Cryptography and Network Security: principles and practices. Pearson Education India (2006).
- -Chowdhury, Z. J., Pishva, D., & Nishantha, G. G. D.: AES and Confidentiality from the Inside Out. In Advanced Communication Technology (ICACT), 2010 The 12th International Conference on IEEE, Vol. 2, 1587-1591, (February 2010).
- -Mandal, A. K., Parakash, C., & Tiwari, A.: Performance Evaluation of Cryptographic Algorithms: DES and AES. In Electrical, Electronics and Computer Science (SCEECS), 2012 IEEE Students' Conference on, 1-5, (March 2012).
- -Adhie, R. P., Hutama, Y., Ahmar, A. S., & Setiawan, M. I.: Implementation Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES) Method in Communication System Based Near Field Communication (NFC). In Journal of Physics: Conference Series, Vol. 954, No. 1, (January 2018).
- -Koko, S. O. A. F. M., & Babiker, A.: Comparison of Various Encryption Algorithms and Techniques for improving secured data Communication. IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 17, No. 1, 62-69, (2015).
- -Kumar, A., Jakhar, D. S., & Makkar, M. S.: Comparative Analysis between DES and RSA Algorithm's. International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, No. 7, 386-391, (2012).
- -Zhou, X., & Tang, X.: Research and Implementation of RSA Algorithm for Encryption and Decryption. In Strategic Technology (IFOST), 2011 6th International Forum on IEEE, Vol. 2, 1118-1121, (August 2011).
- -Somani, U., Lakhani, K., & Mundra, M.: Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing. In Parallel Distributed and Grid Computing (PDGC), 2010 1st International Conference on IEEE, 211-216, (October 2010).
- -Manku, S., & Vasanth, K.: Blowfish Encryption Algorithm for Information Security. ARPN Journal of Engineering and Applied Sciences, Vol.10, No.10, 4717-4719, (2015).
- -Handschuh, H., & Gilbert, H.: χ 2 Cryptanalysis of the SEAL Encryption Algorithm. In International Workshop on Fast Software Encryption, Springer, Berlin, Heidelberg, 1-12, (January 1997).
- -Schneier, B.: Applied Cryptography Second Edition: Protocols, Algorithms, and Source. Beijing: China MachinePress, 239-252, (2000).
- -Rogaway, P., & Coppersmith, D. A.: Software-Optimized Encryption Algorithm. Journal of Cryptology, Vol. 11, No. 4, 273-287, (1998).
- -Charbathia, S., & Sharma, S.: A Comparative Study of Rivest Cipher Algorithms. International Journal of Information & Computation Technology. ISSN 0974-2239 Vol. 4, 1831-1838, (2014).
- -Singh, G., Kumar, A., & Sandha, K. S.: A Study of New Trends in Blowfish Algorithm. International Journal of Engineering Research and Application, (2011).
- -Cornwell, J. W., & Columbus, G. A.: Blowfish Survey. Department of Computer Science. Columbus: GA Columbus State University, 1-6, (2012).
- -Abdel-Karim, A.: Performance Analysis of Data Encryption Algorithms, (2006).
- -Nadeem, A., & Javed, M. Y.: A Performance Comparison of Data Encryption Algorithms. In Information and communication technologies, 2005. ICICT 2005. First international conference on IEEE, 84-89, (August 2005).
- -Dhawan, P.: Performance Comparison: Security Design Choices. Microsoft Developer Network, Tech. Rep. (2002).
- -Singh, S. P., & Maini, R.: Comparison of Data Encryption Algorithms. International Journal of Computer Science and Communication, Vol. 2, No. 1, 125-127, (2011).
- -Verma, O. P., Agarwal, R., Dafouti, D., & Tyagi, S.: Notice of Violation of IEEE Publication Principles Peformance Analysis of Data Encryption Algorithms. In Electronics Computer Technology (ICECT), 2011 3rd International Conference on IEEE, Vol. 5, 399-403, (April 2011).
- -Seth, S. M., & Mishra, R.: Comparative Analysis of Encryption Algorithms for Data Communication 1. (2011).
- -Mandal, P. C.: Superiority of Blowfish Algorithm. International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, No. 9, 196-201, (2012). ISSN 2250-3153 http://dx.doi.org/10.29322/IJSRP.8.7.2018.p79XX
- -Apoorva, Y. K.: Comparative Study of Different Symmetric Key Cryptography Algorithms. International Journal of Application or Innovation in Engineering and Management, Vol. 2, No. 7, 204-6, (2013).
- -Elminaam, D. S. A., Kader, H. M. A., & Hadhoud, M. M.: Performance Evaluation of Symmetric Encryption Algorithms. IJCSNS International Journal of Computer Science and Network Security, Vol. 8, No. 12, 280-286. (2008).
- -Thakur, J., & Kumar, N.: DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation-Based Performance Analysis. International journal of emerging technology and advanced engineering, Vol. 1, No. 2, 6-12, (2011).
- -Hercigonja, Z.: Comparative Analysis of Cryptographic Algorithms. International Journal of Digital Technology & Economy, Vol. 1, No. 2, 127-134, (2016).
- -Alam, M. I., & Khan, M. R.: Performance and Efficiency Analysis of Different Block Cipher Algorithms of Symmetric Key Cryptography. International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, No. 10, (2013).
- -Saini, B.: Survey on Performance Analysis of Various Cryptographic Algorithms. International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4, No. 4, 1-4, (2014).